Chapter 2 Cryptography Flashcards
Which of the following is a good example of a key that is only used once?
A. OTP
B. ISAKMP
C. Multifactor key
D. None of these answers are correct
A
Which of the following is a type of cipher that uses the same key to encrypt and decrypt?
A. Symmetric
B. Asymmetric
C. Ciphertext
D. RSA
A
Which of the following is a symmetric key cipher where the plaintext data to be encrypted is done a bit at a time against the bits of the key stream, also called a cipher digit stream?
A. Asymmetric cipher
B. Block cipher
C. Stream cipher
D. None of these answers is correct.
C
Which of the following is not an example of a symmetric encryption algorithm?
A. AES
B. 3DES
C. RC4
D. RSA
D
Which of the following is an algorithm that allows two devices to negotiate and establish shared secret keying material (keys) over an untrusted network?
A. Diffie-Hellman
B. RSA
C. RC4
D. IKE
A
Assume that Mike is trying to send an encrypted email to Chris using PGP or S/MIME. What key will Mike use to encrypt the email to Chris?
A. Chris’s private key
B. Chris’s public key
C. Mike’s private key
D. Mike’s public key
B
Which of the following implementations uses a key pair?
A. PGP
B. Digital certificates on a web server running TLS
C. S/MIME
D. All of these answers are correct.
D
Which of the following is an entity that creates and issues digital certificates?
A. Certificate Registry (CR)
B. Certificate Authentication Server (CAS)
C. Certificate Authority (CA)
D. None of these answers is correct.
C
Which of the following statements is true?
A. Subordinate CA servers can be invalidated.
B. Subordinate certificates cannot be invalidated.
C. Root certificates cannot be invalidated.
D. Root CAs cannot be invalidated.
A
Which of the following is a series of standards focused on directory services and how those directories are organized?
A. 802.1X
B. X.500
C. X.11
D. X.409
B
Which of the following are examples of common methods used by ciphers?
A. Transposition
B. Substitution
C. Polyalphabetic
D. Polynomial
A, B, C
Which of the following are examples of symmetric block cipher algorithms?
A. Advanced Encryption Standard (AES)
B. Triple Digital Encryption Standard (3DES)
C. DSA
D. Blowfish
E. ElGamal
A, B, D
Which of the following are examples of hashes?
A. ASH-160
B. SHA-1
C. SHA-2
D. MD5
B, C, D
Which of the following are benefits of digital signatures?
A. Authentication
B. Nonrepudiation
C. Encryption
D. Hashing
A & B
Which of the following statements are true about public and private key pairs?
A. A key pair is a set of two keys that work in combination with each other as a team.
B. A key pair is a set of two keys that work in isolation.
C. If you use the public key to encrypt data using an asymmetric encryption algorithm, the corresponding private key is used to decrypt the data.
D. If you use the public key to encrypt data using an asymmetric encryption algorithm, the peer decrypts the data with that public key.
A & C